The article employs correlational research, as it seeks to identify the statistical relationship between two variables: video games and youth violence. The article begins with the proposition that video games have an impact on adolescent and youth violence (Ferguson, 2010, p. 377). In the article, the main dependent variable is youth violence, while the independent one is video games (Ferguson, 2010, p. 381).
The article will be important in my work, as it would enable me to understand children and adolescent psychology and behavior. The findings of the article indicate that violent video games make young people engage in violent behavior, as they often try to practice what they see in them (Ferguson, 2010, p. 387).
Although the study produced reliable results, it is not representative of the target population. The study drew all its participants from the Hispanic community, implying that its findings cannot be used to draw a representative conclusion that includes adolescents from other racial and ethnic groups.
The study is a casual comparative research since it seeks to identify the cause of a ...
... middle of paper ...
...search studies. The paper looks into four relevant studies by locating one article for each methodology.
Ferguson, C. J. (2010). Video games and youth violence: A prospective analysis in adolescents. Journal of Youth and Adolescence, 40(4), 377-391.
Mohebi, S., Sharifirad, G., Feizi, A., Botlani, S., Hozori, M., & Azadbakht, L. (2013). Can health promotion model constructs predict nutritional behavior among diabetic patients? Journal of Research in Medical Sciences, 1(1), 346-359.
Tankersley, M., Harjusola-Webb, S., & Landrum, T. J. (2008). Using single-subject research to establish the evidence base of special education. Intervention in School and Clinic, 44(1), 83-90.
Tokunaga, R. S. (2010). Following you home from school: A critical review and synthesis of research on cyber-bullying victimization. Computers in Human Behavior, 26(1), 277- 287.
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- ... If a multitenant cloud service database is not properly designed, a flaw in one client’s application could allow an attacker access not only to that client’s data, but every other client’s data as well. 91% user has voted that it is still relevant. 4 Study on cyber-attack in cloud computing Cloud resources are the attractive ground for the cyber-criminals due to the huge resources available at the centralized place. Accessibility by anyone subscribing, and from anywhere is offering further options to access the cloud.... [tags: cyber-security, data loss, breaches]
2003 words (5.7 pages)
- As technology takes on the challenge of expanding accessibility to the public the potential uses have been shifted towards malevolent acts. Centuries ago the thought of rectangular touch screens in which one could listen to music , play games, video chat , and access the internet would have made anyone seem crazy . However , through the sprung that technology is developing by it is now only “ normal” to own devices such as iPods, iPads, Tablets, and iPhones. This new device convergence that enables the users to multitask and have access to various features in one single object is what has caused the prevalence of cyber bullying .... [tags: Bullying, Abuse, Cyber-bullying, Cyberstalking]
1398 words (4 pages)
- Everyone has been impacted by crime victimization at some point in their life. While not all will experience first-hand victimization, the impact effects many people. Understanding a person’s past victimization will aid in determining their strengths and needs. The world we live in is not perfect, people are messy, everyone has a story, and it is our job as human service professionals to serve each client with a holistic approach. It is often said that human service professionals enter the field because their own past experiences led them to want to help others through traumatizing, victimizing experiences as they were helped.... [tags: Victimisation, Blame, Victimology]
1108 words (3.2 pages)
- In recent decades, there have been numerous technological advances. Due to the availability of such advances, the use of this technology, particularly the use of Internet, is overwhelmingly present in our society for people of all ages. For instance, 93% of teenagers, ages 12 through 17 use the Internet, matching the 93% of young adults. Whereas, 74% of adults, ages 18 and older, use the Internet (Lenhart et al, 2010). Studies found that adult users over the age of 18 consider the Internet as a means of completing tasks such as shopping and paying bills, in comparison to those under the age of 18 who considers it a tool for social connections (Bhat, 2008).... [tags: cyber bullying, physical bullying, social media]
1484 words (4.2 pages)
- According to “New National Bullying and Cyberbullying Data” a study done on 4,500 12-17 year-olds 36.3% of females reported being cyberbullied in their lifetime, and 30.7% of males reported being cyberbullied in their lifetime (New National). With new forms of technology always coming out it is likely these numbers will increase. Technology has made this an easy form of bullying, one can sit behind a computer screen, cell phone, or even a gaming system and belittle, threaten, and abuse others. The inability to always see cyberbullying, while it’s happening and the vast amounts of technology it can occur through, make this a difficult crime to stop.... [tags: Abuse, Bullying, Verbal abuse, Victimisation]
824 words (2.4 pages)
- Many of us know about cyber socializing, and have used some form of it. Whether it’s texting on a cell phone, chatting on Facebook, or sending e-mails, it’s become a part of everyday life. All of these types of modern technology not only make things easier to contact people, but it can go deeper than that and help you stay in touch with maybe a close relative who lives far away, or a friend who just moved away from home. But at the same time, all of these things need to be used carefully because these internet and mobile sources can lead to a harsh reality for people.... [tags: Cyber World]
1719 words (4.9 pages)
- On April 27, 2007 cyber-attacks began crippling key infrastructures of banks, ministries, and newspapers. These attacks took place, in part, because of a statue. This statue is not just a two-meter tall man holding a helmet; this individual represents and symbolizes the lives lost in the Second World War. The statue has been under a lot of speculation and has torn the population of the country in half. Some believe the status is a symbol of Soviet, formerly Nazi, while some see this statue as symbol of Soviet victory over the Nazis and Russian claims Estonia.... [tags: Cyber Crime]
1170 words (3.3 pages)
- What is Victimology. Consider these statements: “Every year victimization occurs to close to 1 billion persons – premature and violent deaths total to nearly 1.6 million out of 1 billion persons.” (2015) Per the U.S. Department of Justice, “trafficking every year of women and children totals 1 million women. Out of the million, half of these women and children ranges between the ages of 13 to 18.” (2015) Imagine the suffering a victim has to go through; but it is not only just the victim, it is a father, mother, daughter, son, brother, sister, aunt, uncle, grandparents, etc.... [tags: Crime, Victim, Victimology, Criminal justice]
976 words (2.8 pages)
- Cyber bullying is the bullying or harassing of a person or group of people using some form of technology. Louise Cobb (2010) suggests that; Cyber bullying can lead to serious emotional consequences, including depression, low self-esteem, anxiety disorders and suicide. From this information, the Year 11 Health Education students decided to implement an action plan to minimise the prevalence of Cyber bullying and increase awareness among the Year 9 students at Meridan. The action plan allowed the Health Education students to develop three main hypotheses as to why Year 9 Meridan students’ cyber bully.... [tags: Cyber Bullying Essay]
1567 words (4.5 pages)
- Working with Theory to Violent Victimization Understanding the theories of victimology is important to understand the victims, we need to understand the four main theories of victimization. These theories are the principals of victim assessment. It will give the officer the tools to understand the motive behind the victimization giving him different types of views to analyze the victim. The four main theories of victimization are: Victim Precipitation, Lifestyle, Deviant Place, and Routine Activity.... [tags: Victimology, Criminology, Victimisation, Victim]
1030 words (2.9 pages)